Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users.
References
Link | Resource |
---|---|
http://secunia.com/advisories/16472/ | Patch Vendor Advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml | Patch Vendor Advisory |
http://www.securityfocus.com/bid/14585 | Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21884 | |
http://secunia.com/advisories/16472/ | Patch Vendor Advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml | Patch Vendor Advisory |
http://www.securityfocus.com/bid/14585 | Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21884 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2005-08-23 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-2631
Mitre link : CVE-2005-2631
CVE.ORG link : CVE-2005-2631
JSON object : View
Products Affected
cisco
- network_admission_control_manager_and_server_system_software
CWE